home / skills / openclaw / openclaw / node-connect
This skill helps diagnose and fix OpenClaw node connection and pairing issues across local, LAN, Tailnet, and public URL setups.
npx playbooks add skill openclaw/openclaw --skill node-connectReview the files below or copy the command above to add this skill to your agents.
---
name: node-connect
description: Diagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps. Use when QR/setup code/manual connect fails, local Wi-Fi works but VPS/tailnet does not, or errors mention pairing required, unauthorized, bootstrap token invalid or expired, gateway.bind, gateway.remote.url, Tailscale, or plugins.entries.device-pair.config.publicUrl.
---
# Node Connect
Goal: find the one real route from node -> gateway, verify OpenClaw is advertising that route, then fix pairing/auth.
## Topology first
Decide which case you are in before proposing fixes:
- same machine / emulator / USB tunnel
- same LAN / local Wi-Fi
- same Tailscale tailnet
- public URL / reverse proxy
Do not mix them.
- Local Wi-Fi problem: do not switch to Tailscale unless remote access is actually needed.
- VPS / remote gateway problem: do not keep debugging `localhost` or LAN IPs.
## If ambiguous, ask first
If the setup is unclear or the failure report is vague, ask short clarifying questions before diagnosing.
Ask for:
- which route they intend: same machine, same LAN, Tailscale tailnet, or public URL
- whether they used QR/setup code or manual host/port
- the exact app text/status/error, quoted exactly if possible
- whether `openclaw devices list` shows a pending pairing request
Do not guess from `can't connect`.
## Canonical checks
Prefer `openclaw qr --json`. It uses the same setup-code payload Android scans.
```bash
openclaw config get gateway.mode
openclaw config get gateway.bind
openclaw config get gateway.tailscale.mode
openclaw config get gateway.remote.url
openclaw config get gateway.auth.mode
openclaw config get gateway.auth.allowTailscale
openclaw config get plugins.entries.device-pair.config.publicUrl
openclaw qr --json
openclaw devices list
openclaw nodes status
```
If this OpenClaw instance is pointed at a remote gateway, also run:
```bash
openclaw qr --remote --json
```
If Tailscale is part of the story:
```bash
tailscale status --json
```
## Read the result, not guesses
`openclaw qr --json` success means:
- `gatewayUrl`: this is the actual endpoint the app should use.
- `urlSource`: this tells you which config path won.
Common good sources:
- `gateway.bind=lan`: same Wi-Fi / LAN only
- `gateway.bind=tailnet`: direct tailnet access
- `gateway.tailscale.mode=serve` or `gateway.tailscale.mode=funnel`: Tailscale route
- `plugins.entries.device-pair.config.publicUrl`: explicit public/reverse-proxy route
- `gateway.remote.url`: remote gateway route
## Root-cause map
If `openclaw qr --json` says `Gateway is only bound to loopback`:
- remote node cannot connect yet
- fix the route, then generate a fresh setup code
- `gateway.bind=auto` is not enough if the effective QR route is still loopback
- same LAN: use `gateway.bind=lan`
- same tailnet: prefer `gateway.tailscale.mode=serve` or use `gateway.bind=tailnet`
- public internet: set a real `plugins.entries.device-pair.config.publicUrl` or `gateway.remote.url`
If `gateway.bind=tailnet set, but no tailnet IP was found`:
- gateway host is not actually on Tailscale
If `qr --remote requires gateway.remote.url`:
- remote-mode config is incomplete
If the app says `pairing required`:
- network route and auth worked
- approve the pending device
```bash
openclaw devices list
openclaw devices approve --latest
```
If the app says `bootstrap token invalid or expired`:
- old setup code
- generate a fresh one and rescan
- do this after any URL/auth fix too
If the app says `unauthorized`:
- wrong token/password, or wrong Tailscale expectation
- for Tailscale Serve, `gateway.auth.allowTailscale` must match the intended flow
- otherwise use explicit token/password
## Fast heuristics
- Same Wi-Fi setup + gateway advertises `127.0.0.1`, `localhost`, or loopback-only config: wrong.
- Remote setup + setup/manual uses private LAN IP: wrong.
- Tailnet setup + gateway advertises LAN IP instead of MagicDNS / tailnet route: wrong.
- Public URL set but QR still advertises something else: inspect `urlSource`; config is not what you think.
- `openclaw devices list` shows pending requests: stop changing network config and approve first.
## Fix style
Reply with one concrete diagnosis and one route.
If there is not enough signal yet, ask for setup + exact app text instead of guessing.
Good:
- `The gateway is still loopback-only, so a node on another network can never reach it. Enable Tailscale Serve, restart the gateway, run openclaw qr again, rescan, then approve the pending device pairing.`
Bad:
- `Maybe LAN, maybe Tailscale, maybe port forwarding, maybe public URL.`
This skill diagnoses OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps. It guides you to find the real route from node to gateway, verify what OpenClaw is advertising, and fix pairing/auth errors like "pairing required", "unauthorized", or "bootstrap token invalid or expired."
It inspects the effective gateway route by preferring openclaw qr --json and a small set of canonical config checks (gateway.bind, gateway.tailscale.mode, gateway.remote.url, plugins.entries.device-pair.config.publicUrl, gateway.auth.*). It compares expected topology (same machine, same LAN, tailnet, or public URL) to the advertised route, then gives one concrete diagnosis and one clear remediation step. If Tailscale is involved it also checks tailscale status --json and device pairing state with openclaw devices list.
What should I run first when a node can't connect?
Run openclaw qr --json and check gatewayUrl and urlSource; if remote, also run openclaw qr --remote --json.
The app says "unauthorized" — what now?
Confirm the token/password and gateway.auth.allowTailscale setting match the intended flow; adjust auth or enable explicit token use.
When do I need a fresh setup code?
Any time you change URL or auth configuration, or if the app reports bootstrap token invalid or expired.